hashlookup / hashlookup-forensic-analyserLinks
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
☆128Updated 2 years ago
Alternatives and similar repositories for hashlookup-forensic-analyser
Users that are interested in hashlookup-forensic-analyser are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 3 years ago
- Digital Forensics Artifacts Knowledge Base☆89Updated 3 weeks ago
- A collection of tips for using MISP.☆75Updated last year
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆101Updated last month
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆120Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆115Updated this week
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆76Updated last month
- Python library for threat intelligence☆93Updated last year
- An open source platform to support analysts to organise their case and tasks☆122Updated this week
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆90Updated 2 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆50Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆41Updated 8 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Website for ail-typo-squatting library☆70Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆149Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆49Updated 3 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago
- Collection of Dashboards for Threat Hunting and more!☆71Updated 5 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆209Updated 5 years ago
- Resources, tools and utilities about Threat Intelligence☆78Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated last month